when I modifed password，
WARN [org.keycloak.events] (default task-44) type=UPDATE_PASSWORD_ERROR, realmId=master, clientId=security-admin-console, userId=ce4b5650-90b3-4946-be86-67ee4b17bfc9, ipAddress=XX.XX.XX.XX, error=password_rejected, reason=‘Could not modify attribute for DN [CN=XXX,OU=XXX,OU=People,OU=Users,OU=XXX,DC=XXX,DC=com]’, auth_method=openid-connect, custom_required_action=UPDATE_PASSWORD, response_type=code
I have the same problem. Did you solve this in the meantime?
My Keycloak has a working LDAPS connection to my DC but still I can’t change passwords:
Could not modify attribute for DN [CN=TEST TESTER,OU=Benutzer,DC=domain,DC=local]
Finally found my fault.
The Bind DN user used for changing passwords didn’t have enough rights for changing the passwords…
Hey can you provide more details as what permission this the Bind DN user needed?
please have a look here: https://petri.com/delegate-permission-reset-ad-user-account-passwords
This is for Active Directory, but any other LDAP should be similar.
You have to grant special rights to the user.
I’m trying to reset my password with keycloak’s edit mode set to writable and receiving an error that says “Could not modify attribute for DN,” so I tried the method you provided, but it didn’t work for me.
Please make a suggestion for a workaround.
Did you check the permissions of the ad user used for changing the passwords? It works, if you use the instrutions from https://petri.com/delegate-permission-reset-ad-user-account-passwords
Thanks for your quick response !!!
I followed the directions, but it didn’t work in my case. Please validate, I am attaching a screenshot of permission to change passwords.
did you use the assistant to grant the permissions as stated in linked website?
On my system there are some more permissions enabled for the user, e.g. “Read all properties”.
And I used an extra service user, not the normal Admin account.
Yes, I followed the steps in the link to grant the permission; the only thing that was missing was enabling the permission “Read all properties” for the user, which I enabled, but it still didn’t work.
In my case, I used a standard admin account, as it’s a bind user for my keycloak server.